Best-Selling Books on Security from RSA 2013
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
760 articles
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
Young researchers, original security projects, making contacts among your peers, and a stepping-stone into the professional community – these are the key ingredients of Kaspersky Academy’s ‘CyberSecurity for the Next
Due to a lack of malicious activity targeting Mac OS X it has been considered a relatively safe operating system for some time now. But times change, and that complacency
Home PCs and laptops remain an important place for storing sensitive information, including personal emails, logins and passwords, photos, financial data and more. Of course, this information needs to be
We were able to sit down with the students and graduates who present their researches at Kaspersky Lab`s “Cybersecurity for the Next Generation” students conference that took place last week
All industries, including IT, need emerging talent and ambitious specialists joining their ranks, bringing with them fresh ideas that help create a foundation for future innovations. Every year millions of
Stefan Tanase, Kaspersky Lab’s Senior Security Researcher, Global Research & Analysis Team, answers users’ questions about social networks, malware and everything in between. There is a saying: “information is power”
Olga Rumyantseva has succeeded in her solo-climb of the highest volcano in Antarctica – Mount Sidley! Olga was lucky with the weather (though you could be forgiven for thinking otherwise
Renowned mountaineer Olga Rumyantseva has started her first ascent of the Kaspersky 7 Volcanoes expedition. Olga is set to solo-climb the highest volcano on each continent and a week ago
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
It’s always frustrating if your smartphone or tablet gets lost or stolen – and that frustration is compounded by the loss of valuable data stored in the device’s memory. Worse
In a three-month period this year, Kaspersky Lab products detected and prevented nearly 1.5 billion attempts to infect users’ computers. These included attacks on mobile devices and malware targeting Mac
Windows Phone doesn’t have the market reach of Android-powered devices, or the slick appeal of the Apple iPhone, but the availability of multiple Windows 8 devices late this year could
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there
Google’s Android operating system far and away dominates the mobile market with more than 68 percent of devices running the open source OS, according to research firm IDC. Whilst this
U.S. customs officials are increasingly interested in the data stored on mobile devices and laptops. For international travelers who have sensitive data on their phones (we mean corporate folks, not
Hackers spent much of 2012 laying the groundwork for what they have in store for not only big business and strategic government and military targets, but consumers as well in
There is no shortage of hard problems to solve in security. Unsafe Web applications, network defense, mobile device security–all of these are challenges in need of solutions. And the students
A common lament in the security industry is the lack of young talent, of educated and dedicated people coming out of universities with fresh ideas. Executives and engineers often wonder
Those looking to tighten the security of their internet browsing experiences have a lot of choices these days. There is a slew of security and privacy related plug-ins available for
In terms of security it’s not the one who has more talented programmers who creates the best protection. Instead, it’s often the one who’s been attacked the most who’s forced